The lawmakers warned that allowing ICE to use spyware “threatens Americans’ freedom of movement and freedom of speech.”| Articles – Truthout
Contexts is a quarterly magazine that makes cutting-edge social research accessible to general readers.| Contexts
New records obtained by BINJ also confirm that BPD flew a drone over this year’s Dominican Parade The post Boston Police Deployed 71 Drone Flights Over Caribbean Carnival appeared first on HorizonMass.| HorizonMass
The false matches were disproportionately people of color, said the ACLU.| BuzzFeed News
The Kremlin has rolled out a mandatory new messenger app that can spy on everyone all the time| Coda Story
Après avoir dénoncé les dérives de l'algorithme de notation utilisé par la CAF pour sélectionner les personnes à contrôler, nous abordons ici la question des contrôles CAF réalisés sur signalements policiers. Utilisée par la police comme arme de répression sociale et politique, cette pratique symbol| La Quadrature du Net
Deutschland praktiziert seit Jahren eine Vorratsdatenspeicherung. Unbeachtet von der Öffentlichkeit werden Finanztransaktionsdaten auf Vorrat gespeichert.| www.kuketz-blog.de
Working on abortion access in Texas, we see every day how immigration justice and reproductive justice are inseparable.| Truthout
Yes, every device we own is probably harvesting our data. But the car might be the worst offender. The post Friday Video: You Should Care That Your Car Is Spying On You appeared first on Streetsblog San Francisco.| Streetsblog San Francisco
The EU is pushing legislation that would scan all our private messages, even in encrypted apps.| Metalhearf's Blog
The company’s biometric tech always sounded like it was ripped from the plot of a dystopian thriller, but recently, the iris-scanning system developed by the Massachusetts-based BI² Technologies has become part of the nation’s deportation dragnet. How BI² landed an ICE contract worth as much as $10 million is in part a tale of the […]| Mother Jones
In an escalation of its already tight grip on religious freedom, China introduced a sweeping set of regulations that strictly control how clergy of officially recognized religions can operate online. The new rules – released by the State Administration for Religious Affairs on Sept, 15 – are a continuation of Beijing’s long-term campaign to control religious practices in an effort to reshape faith so it aligns with the Chinese Communist Party. The 18-article document, titled “Code of ...| The Roys Report
The Athens-Clarke County Police Department will open a new surveillance hub later this month called the “Real Time Crime Center” which will greatly expand the| Athens Politics Nerd
The Alberta government confirmed it is ending My Recovery Plan, the app that ostensibly tracked recovery progress & facility wait lists. However, the app is hosted by Amazon, placing users' personal health data at the mercy of the American Cloud Act.| Drug Data Decoded
Lors des mobilisations, nos smartphones sont des outils cruciaux pour s'organiser. Bien qu'ils soient extrêmement pratique à bien des égards, ils peuvent aussi devenir dangereux si ils tombent dans de mauvaises mains ou sont mal…| La Quadrature du Net
True to its Marxist-Leninist roots, the Chinese Communist Party has long regarded religion as spiritual opium. A few weeks ago, it appeared to double down on the drugs imagery by banning people from entering the country carrying religious ideas or objects beyond those required for personal use. Foreign nationals hoping to deal in religion — preaching, teaching or organising religious events — must now seek permission ahead of time from state-sanctioned religious bodies (that permission wi...| UnHerd
Alberta's Ministry of Mental Health and Addiction is quietly terminating its contract with a personal data-harvesting app and replacing it with a publicly-owned 'bed availability dashboard.' The move coincides with reported scrutiny of ministry spending by the Auditor General.| Drug Data Decoded
Leaked emails show Epstein’s attempts to dabble in security tech—across borders—in the last years of his life.| Reason.com
La lutte contre la vidéosurveillance algorithmique (VSA) est une bataille de longue haleine. L’expérimentation officielle, menée au prétexte des Jeux Olympiques, s’est pourtant achevée fin mars et a été émaillée de multiples défaillances. En parallèle,…| La Quadrature du Net
Au milieu de l’hiver, la loi Narcotrafic est arrivée à toute vitesse et, avec elle, ont déferlé des propositions sécuritaires et de surveillance qui dépassaient largement la question du trafic de stupéfiants. Avec vous, nous…| La Quadrature du Net
The Pegasus hacking tool was just the beginning. A new survey of spyware firms reveals Israeli companies are being used by agencies in Western nations to build perfect dictatorships under democratic guise. This article was originally published by ¡Do Not Panic! Last week another batch of peaceful pro-Palestine protestors were arrested by British police on suspicion| The Grayzone - News and investigative journalism on empire
Skechers is making a line of kid’s shoes with a hidden compartment for an AirTag.| Schneier on Security
Mick Hall covers the upgrade of the U.S. intelligence agency's Wellington operation to "counter the CCP" as another milestone of U.S. meddling in the Asia-Pacific. By Mick Hall in Whangarei, New Zealand Special to Consortium News The opening of a Federal Bureau of Investigations standal| Consortium News
The EU is edging towards its biggest peacetime surveillance experiment yet — scanning every private message before it's even sent.| The Daily Sceptic
‘Defending the institutions and “standing up for science” is really clinging to a bygone illusion. The stakes of institutional engagement are changing as institutions are…being de…| Legal Form
A state that monitors its citizens without restraint is no longer protecting its people.| Indonesia at Melbourne
Now that I’ve mentioned it to her, Ms. Pacidal—an Amis Indigenous woman in her 80s—starts to fiddle with the watch on her left hand. It has a black, square, and boxy plastic face, on which shines a dimly lit screen that shows the date and time, location tracking services, and a daily step count. “It’s light,” she says. “In fact, almost forgettable!” It’s secured on Ms. Pacidal’s arm with a rubber strap, and she tells me that she has not taken it off for months.| Platypus
On Friday, the Cyberlaw Clinic filed an amicus brief before the Massachusetts Supreme Judicial Court in the case Commonwealth v. Thanh Du. The brief, filed on behalf of the Massachusetts […]| Cyberlaw Clinic
La numérisation à marche forcée des services publics ne découle pas de la prétendue « révolution numérique ». La dématérialisation des démarches administratives, les algorithmes de contrôle CAF, le profilage des chômeurs et des chômeuses, les logiciels de gestion et d’aide à la décision qui régissent les tâches des travailleurs et des travailleuses sociales sont la concrétisation de choix politiques et d’orientations du service public. S’inscrivant dans une logiqu...| Le Mouton Numérique
Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE.| 404 Media
Executive Q & A with Jay Jason Bartlett, CEO, Cozaint Q1: Welcome Jay to this Fujifilm Insights Executive Q & A! Please tell us a bit about your role and responsibility as CEO of Cozaint. Ans: Thanks Rich for the invite. I head up a great team of engineers and professionals that have a ton […] The post Why LTO Data Tape is a Perfect Fit for the Massive Video Surveillance Market appeared first on Fujifilm Data Storage.| Fujifilm Data Storage
By Rich Gadomski, Head of Tape Evangelism, FUJIFILM Data Storage Solutions The International Security Conference held its annual west coast trade show in Las Vegas on April 10 -12. ISC West is the premier showcase for the latest innovations and solutions spanning a broad range of security technologies for security professionals, system integrators, manufacturers and […] The post ISC West 24 Reveals Pain Points of Video Surveillance Retention and How LTO Data Tape with Cozaint’s Marcia is ...| Fujifilm Data Storage
Spies have been around forever, but, in this weeks’ Time Machine, we’re looking at the modern surveillance state…and what Americans have thought about it over the decades. The formation of the NSA in 1952 marked the beginning of modern-day government surveillance and public opinion on privacy and security has slowly evolved ever since. Among the […]| Home of the Marist Poll
The U.K. has spent decades trying to subvert Iran’s government, but also secretly sold them chemical weapons and spied on opposition activists, reports Martin Williams. By Martin Williams Declassified UK As bombs fell on Iran last month, the U.K. government claimed it had “not partici| Consortium News
Anonymous Submission to Jersey Counter-Info Philly’s not the only city with too many cameras so let’s make Camover 2025 go as far and wide as the surveillance state. Text and…| Jersey Counter-Info
The June 22, 2025 broadcast covers the following stories: TRANSCRIPT JUSTIN BRAKE: From Benoit's Cove, Newfoundland and Labrador, this is The Indy Broadcast. Welcome to the show for Sunday, June […]| The Independent
Atlanta is the most surveilled city in the United States. With 124.14 surveillance cameras per 1,000 people, we not only lead the country, we have more than twice as many cameras per capita as 2nd …| mapping atlanta
Additional funding and new rules for Portland Police Bureau’s drone program -- rules written by the police bureau -- could be coming very soon.|
A series questioning the AI race concept and how it drives US AI and China policy|
I just returned from an international trip. I’m going to integrate these into the original post here, but for now I’ll just relate my recent experience and key takeaways. Background I’ve been rather paranoid about traveling abroad, despite having done it many times before. More specifically, I was worried about returning to the United States […] The post Border Insecurity (Update) appeared first on Firewalls Don't Stop Dragons.| Firewalls Don't Stop Dragons
It's time for another quick and easy 'dragon hack'. Today I'll tell you how to stop people from snooping on your communications. Meet Your Foe: Spying Message Apps Since the dawn of the World Wide Web, we've had proprietary messaging apps: AOL Instant Messenger (AIM), Yahoo Messenger and MSN Messenger were probably the most popular.| Firewalls Don't Stop Dragons
France Travail déploie actuellement des robots visant à automatiser et massifier le contrôle des personnes inscrites à France Travail. Depuis le 1 janvier 2025, cela inclut également les personnes au RSA. Il s'agit d'une nouvelle étape du dangereux projet de gestion algorithmique des personnes sans-| La Quadrature du Net
As West Nile virus is detected in mosquitoes collected in the UK for the first time, we take a look at how UKHSA is protecting the UK from vector-borne diseases| ukhsa.blog.gov.uk
Today's links| Pluralistic: Daily links from Cory Doctorow
UpGuard’s security researcher Chris Vickery has discovered three misconfigured AWS S3 buckets that are available for public access on the internet. The| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
As Chief Mark Neufeld announces his resignation, a ten-month investigation by Drug Data Decoded reveals extensive social media monitoring by his media relations unit that could violate privacy regulations.| Drug Data Decoded
Your rights are significantly reduced when crossing the border, even if you're entering your own country. Sadly, there's not a lot you can do about it.| Firewalls Don't Stop Dragons
Clearview AI’s saga in Europe underscores the clash between international tech firms and supposedly robust EU privacy laws.| Solomon
This week, the Cyberlaw Clinic filed an amicus brief before the Supreme Judicial Court of Massachusetts (“SJC”) in Commonwealth v. Rodriguez (SJC-13727). The Clinic represented the Innocence Project, the Center on Privacy & Technology at Georgetown Law, and independent researcher Dr. Isadora Borges Monroy. The brief supports defendant-appellee Nathaniel Rodriguez, who objects to the Lowell Police Department’s use of racially-targeted police investigatory techniques on social media platf...| Cyberlaw Clinic
A discussion with WBAI’s Law and Disorder radio show on the new graphic booklet Homeland Security: Myths and Monsters. The post Audio: Interview with Law and Disorder radio show appeared first on Arun Kundnani.| Arun Kundnani
Host James Pope and Arun Kundnani go deep on the life of Jamil Al-Amin, formerly known as H. Rap Brown, in this conversation for the Africa World Now radio show.| Arun Kundnani
The privately owned, sole-sourced app that collects personal health information of people entering recovery programs was launched as ‘voluntary’ to comply with Alberta privacy laws. But eight months later, it isn’t voluntary anymore.| Drug Data Decoded
The transatlantic dimension of intelligence sharing and intelligence diplomacy is being eroded since Trump's re-election and his pledging allegiance to the red, white, and blue of Putin’s Russia.| about:intel
The Alberta government has yet to release its proposed Compassionate Intervention Act but indicated in 2023 that the Act would extend existing legislation for forced abstinence of children to adults. Documents show that survival and other data are not tracked after children exit the system.| Drug Data Decoded
In a Q&A for the Digital Front Lines report by Foreign Policy Analytics, The Citizen Lab director Ron Deibert and human rights activist Carine Kanimba| The Citizen Lab
Following a public workshop in July 2024, a report from the National Academies of Sciences, Engineering, and Medicine shares strategies for improving cancer surveillance. One of the OneFlorida+ Clinical Research Network’s executive chairs, Elizabeth Shenkman, Ph.D., spoke at the workshop about “Data Linkages in Cancer Surveillance Models.” Shenkman’s insights are summarized in a new report,…| OneFlorida+ Clinical Research Network
Configuring Motion Notifications in Blue Iris with the Docker Container Ntfy. Overall, the best, and most performant setup you can use!| WunderTech
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
When the general public becomes increasingly aware of online surveillance attempts, how do they respond? Jon Penney, research fellow at Citizen Lab, looks into how individuals navigate this digital landscape and who is most likely to alter their behaviour.| The Citizen Lab
The current big news on ChatGPT is around the decisions by K-12 school districts to pause, think, push back and sometimes “ban” ChatGPT. I’ve mostly…| Is a Liminal Space
Mayor London Breed’s priorities are all over your March 5 primary ballot, including one measure that proposes to give San Francisco police expanded use of drones and surveillance cameras.| SFist - San Francisco News, Restaurants, Events, & Sports
The Youth Endowment Fund (YEF) was established in March 2019 by children’s charity Impetus, with a £200m endowment and a ten-year mandate from the Home Office. The YEF has just published a report a…| Jen Persson's blog
WeChat communications conducted entirely among non-China-registered accounts are subject to pervasive content surveillance that was previously thought to be exclusively reserved for China-registered accounts.| The Citizen Lab
We're not just tracked as we surf the web, we're being tracked in the physical world, too. Our location can be very revealing. Here are some tips to limit this.| Firewalls Don't Stop Dragons
Vision language models represent a new generation of deep learning frameworks capable of processing both images and text as input and producing either as outputs. Though still relatively new, businesses are beginning to recognize the potential of these models and are gradually integrating them into applications. Vision language models can be used to query images, […] The post A Comparative Evaluation of Open-Source Vision Language Models appeared first on QBurst Blog.| QBurst Blog
With illustrations by Anuj Shrestha and co-authored with Mizue Aizeki. This is the century of homeland security. The federal government created a monster. They said it would keep us safe. The monster hatched in November 2002. It was named the Department of Homeland Security (DHS). An appetite for control and conquest was in its DNA.… The post Homeland Security: Myths and Monsters appeared first on Arun Kundnani.| Arun Kundnani
AI video analytics are a cost-effective solution enabling real-time accurate event detection for small businesses and smart retail.| Hailo
Today, the Supreme Judicial Court of Massachusetts (“SJC”) issued a ruling in Commonwealth v. Dilworth (SJC-13547), holding that the Boston Police Department violated the law by refusing to turn over evidence of potential online racial profiling. The decision is welcomed by the Cyberlaw Clinic, which previously represented Berkman Klein affiliates Michael Bennett and Zahra Stardust, along with the ACLU of Massachusetts and the Innocence Project, on an amicus brief in the case.| Cyberlaw Clinic
COVID Q & A Scientifically-informed, data-driven answers to your burning questions about the coronavirus pandemic Post #4: The Exit Strategy Welcome to Naturally Speaking’s blog series on COVID-19. This fourth episode is about the ‘exit strategy’: the lifting of lockdown measures related to the COVID-19 virus. This is a particularly challenging topic, as there are […]| Naturally Speaking
Welcome to Naturally Speaking’s blog series on COVID-19. This fourth episode is about the ‘exit strategy’: the lifting of lockdown measures related to the COVID-19 virus. This is a particular…| Naturally Speaking
In-depth report says tech from Hikvision, Dahua, Tiandy and Uniview enables China’s gross human rights abuses of Uyghur minority.| The Logic
Explore how AI in public safety balances security & privacy. Our edge AI solutions ensure secure environments while respecting privacy. Learn how!| Hailo
They were good calls at the time. Just a few weeks ago a clutch of farm writers from across Canada converged on Glacier FarmMedia's Ag in Motion show west| Grainews
DPS plans to spend millions in taxpayer dollars on a controversial software, used first as part of Governor Abbott’s border crackdown, to “disrupt potential domestic terrorism.”| The Texas Observer
An app that privatizes health information of recovery patients is aimed at Alberta shelters, correctional facilities and supervised consumption sites. In one case, data from the app that showed a negative outcome was suppressed, but the government still publicly reported it.| Drug Data Decoded
My Recovery Plan was implemented to evaluate and manage substance use treatment waitlists across Alberta. Documents reveal how it denies patients informed consent and control of their personal health information.| Drug Data Decoded
Follow us on Twitter @HackRead| Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
A trois jours de la fin des Jeux olympiques, la répression des militant.es se poursuit. Alors que, déjà la semaine dernière, trois militant.es ont été abusivement interpellé.es en marge d’un Toxic tour qui, par ailleurs, a pu se dérouler sans … Continue reading →| Non au Saccage 2024 !
When asked about privacy in the digital space, the usual answer seems to be a scoff. Sometimes it is even followed by a taunting sneer with a tint of “there is nothing we can do about it though” look. But why is that? A View on Privacy – The Scoff Here are the common […]| Open Ethics Initiative
As German intelligence law undergoes additional reforms, lawmakers should also fix the untenable gaps regarding the legal basis and oversight of surveillance activities by the German armed forces| about:intel
Police at the University of Colorado Boulder have begun publishing statistics that reveal how they're using license plate readers installed around campus.| EdScoop
Contexts is a quarterly magazine that makes cutting-edge social research accessible to general readers.| Contexts
How optimizing the digital capabilities of the Dutch intelligence and security services has derailed. The post Stalemates in Dutch intelligence oversight appeared first on about:intel.| about:intel
Remember that thumbsucker I did on the Great Firewall? Well, here’s some data, via this post (thanks, Jamie). It seems that Fang Binxing, China’s Chief Bellhead, boss of the Beijing University of Post & Telecoms, and king of the great firewall, really is in trouble due to his special relationship with Bo Xilai. He briefly […]| Alternate Seat of TYR
Tim Maughan takes a bus into the Cloud. Spread over two days in April at Princeton’s School of Architecture, Data Drama was the latest attempt to try and capture the post-Snowden, paranoia-infested, panic-overloaded, drone-struck global Zeitgeist - if such a thing even exists. Which academic disciplines are most applicable for trying to fathom where our collective networked neurosis is leading us? Data Drama’s curator Liam Young, known for his work at Princeton and London’s Architecture...| Arcfinity
From Alphaville to Robocop, science fiction has the measure of smart cities, says Tim Maughan. In a recent article on the continuing civil unrest in Turkey, sociologist Zeynep Tufekci argues that the science fiction metaphors the media so frequently turn to are outdated. “Nineteen Eighty-Four had finally arrived, it was said - just off by 30 years or so. But this is the wrong way to understand what’s happening,” she argues. “Deep and pervasive surveillance is real. It is likely worse ...| Arcfinity
New Dutch law grants intelligence services expanded powers for intercepting internet traffic to counter foreign cyber threats, raising questions about its practical implications| about:intel
It’s no secret that insurance companies would do pretty much anything to detect fraud but now they seem to be crossing some legal lines as well. If you’re in the US and look up to the sky not just for the eclipse, odds are you’ll see a flying object that’s spying on you on behalf […]| TechTheLead
A new statutory framework for the Independent Control Council is needed to better protect fundamental rights and ensure independent and effective oversight.| about:intel
The hidden depths of U.S. surveillance reveal the post-9/11 shift towards extensive data collection and its impact on privacy| 911Truth.Org
See how multi-camera tracking & multi-person tracking with Hailo-8 boosts operations for retail and security efficient accurate insights.| Hailo
Am diesjährigen Winterkongress der Digitalen Gesellschaft haben wir mit einem Vortrag die Mehrfachrolle von Google als Quasi-Suchmaschinen-Monopolist,| Das Netz ist politisch
Update 2: TrueCrypt audit results released (PDF) Update: the TrueCrypt project unexpectedly shut down on 28 May 2014. A mirrored copy of TrueCrypt.org is available on Andryou.com. The home page of …| Doug Vitale Tech Blog
By Frank Bajak March 4, 2024 In the aftermath of the 9/11 terror attacks, former national security advisor John Poindexter launched Total Information Awareness, intent on preventing future assaults on the homeland by amassing extensive databases on people and their movements. The Pentagon program had a creepy eye-surveilling-the-globe-from-a-pyramid logo and was roundly rejected by civil […]| FRANK BAJAK
Physical security is critical to any security plan. Click to learn how Genea can help you strengthen your physical security.| Genea
One of the most important activities to make Matrix a mainstream protocol is lowering the barrier to entry for the general public. The Matrix.org website is a critical step of the onboarding. The Foundation doesn't have the resource to tackle user testing on the matrix.org website for now, although it would love to do it eventually. Fortunately, there is a much more affordable solution: web analytics.| ergaster.org
Retrouvez l'ensemble de nos travaux sur l'utilisation par les administrations sociales d'algorithmes de notation sur notre page dédiée et notre Gitlab. « Nous n'avons pas à rougir ou à nous excuser ». Voilà comment le directeur de la CAF -- dans un « Message au sujet des algorithmes » à destination| La Quadrature du Net
I don’t want to self-host, and even worse: I think most individuals shouldn’t host services for others. Yet, I am self-hosting services and I even teach people how to do it.| ergaster.org
A recently published US Army manual on countering drones. “Units should always assume the enemy is using a UAS to observe or attempt to observe them. Modern, friendly, and allied sensors—whic…| Warrior Publications
In what is surely another example of people thinking something is a bright idea just because it is possible, cities are putting RFIDs in recycle bins. The trash collection process weighs the bins and logs who is being naughty in their recycling habits. I had a lot to say about this when the Fox News journalist contacted me. Credit where credit is due — I learned about the process of chipping dairy cows and weighing their milk production from the course project of an undergraduate from Wisco...| Blown to Bits 2d Edition